S.No |
Paper Title / Authors |
Download Paper |
Downloads |
1 |
Distributed Collaborative Approach to Botnet DetectionZAHRADDEEN GWARZO, MOHAMED ZOHDY, HUA MING, RICHARD OLAWOYIN, HANY OTHMAN |
|
6 |
2 |
A Survey on: Content Based Video ClassificationHANSA SHIMPI, SUDEEP THEPADE |
|
8 |
3 |
Biometric Identification Using Eye TrackerRAMEEZ ALI P, S VIJAYANAND |
|
1 |
4 |
Survey on Enhanced Anomaly Based Intrusion Detection System Using Limited Labeled DataPRADNYA PATIL |
|
1 |
5 |
A Smart Traffic Communication Protocol in VANETMONIKA PRAJAPATI, PRATEEK SINGH |
|
1 |
6 |
Reliable Access Control Management and Mechanisms in Social NetworksG.V.PRABA, V.PARAMESWARI MCA., M.PHIL. |
|
1 |
7 |
Location Based Management for Mobile Phones (Android) To Provide Secured TransactionsJYOTI KSHIRSAGAR, JUHI DESHPANDE, POORVA CHOUGULE |
|
1 |
8 |
Street Light Automation System Using Arduino UnoANUSHA RAO, AKASH KONNUR |
|
1 |
9 |
Application based on Voice as Medicine Guide for Visually ImpairedANSARI KASAF, AYASHABI MASHAYAK, SAIMA SHAIKH, PATILL S.C |
|
1 |
10 |
Twitter User Circle Detection Using Multi-View Network StructureASSIST PROF: PALLAVI PATIL, MANJUSHA JAGTAP, DHANASHRI SHINDE, SONAL SHINDE, DHANASHREE WAYDANDE |
|
1 |
11 |
Power Quality Renewable Energy Effective Use of Grid by Wind Intelligent TechniqueDR.P.SELVAM, M.P.SAKTHIVEL |
|
2 |
12 |
A Novel Approach for Software Defect Prediction Using Learning AlgorithmsMAHESWARI S, CHITRA K |
|
2 |
13 |
Location based Service and Health Monitoring System for Heart Patient using IoTABHISHEK MANE, VAIBHAV DIGHE, RUSHAL GAWALI, SNEHA SABALE, SANTWANA GUDADHE |
|
3 |
14 |
Accessing Securely DNA Database using Aggregate QueriesSHWETA MOKAL, VEDANTI GHATE, SHUBHAM SAWAKE, ANKIT MUGALI, PRF. PALLAVI AHIRE |
|
1 |
15 |
A Survey on LPG Level Onitoring, Booking & Gas Leakage DetectorMADURA GHULE, KOMAL HOLE, SAYALI PATHAK , NISHIGANDHA PATIL , PROF. SANTOSH A. DARADE |
|
4 |
16 |
Review on Security Model for TCP/IP Protocol SuitePRIYANKA PAWAR, AJAY PHULRE |
|
1 |
17 |
A New Approach of Classification of Alzheimer's Disease of MRI Images Using (Learning Vector Quantizer) ClassifierKAMBLE SHWETA , DR. V. V. DIXIT |
|
1 |
18 |
Image Processing Techniques for Diagnosis of MalariaCHAITANYA LAXMAN GODSE, DR. V. V. DIXIT |
|
2 |
19 |
Kinect Based Classification of Accessibility from Natural Body LanguageDIKSHA A. SHENDE, DR. R. S. KAWITKAR |
|
1 |
20 |
A Survey on Achieving Hitless Defragmentation with Dynamic Fragmentation Using Mixed Path AlgorithmSHWETA PRATAPWAR, SWEJAL DHAMALE, ZAHID SHAIKH, ASHISH SHUKLA, PROF.F.S.GHODICHOR |
|
1 |
21 |
Performance Comparison of Extracted features using Hybrid SIFT ApproachRUPAL SHROTI, PROF.AISHWARYA MISHRA |
|
1 |
22 |
Cellular Automata for Mobile Adhoc Using EARPR.STELLARANI, R. BHUWANESWARI |
|
1 |
23 |
An Energy Saving In Wireless Sensor Networks over Multihop TechniqueG.CHANDRAN, R.MEYANAND, M, R. BHUWANESWARI |
|
2 |
24 |
A-LEACH Algorithm to Maximize the Life Span of Wireless Sensor NetworkSHIBDAS BHATTACHARYA, SUBHAJIT MUKHERJEE, DIPRA MITRA, PRASUN KUMAR MITRA |
|
3 |
25 |
A Survey on Riding Quality Evaluation and Driver Physiology Detection through IOTKEDAR JOSHI, NAMRATA JATAK, ASHISH BAGWE, KIRAN GARGOTE, PROF.SUSHMA SHINDE , DR.BRIJENDRA GUPTA |
|
1 |
26 |
A Comparative Study on Image Isolation and Classification Techniques in Microscopic Blood Smear ImagesRenuka V Tali, Siddalingesh Bandi |
|
4 |
27 |
Graphene Based Component DesignANANT GAMBHIR , DR. D. M. BHALERAO |
|
1 |
28 |
End User Friendly and Secure Architecture for Authentication of Cloud ServicesAPOORV KHARE, PROF. ANSHUL KHURANA |
|
2 |
29 |
A Survey on Search Recommendation Mechanism for Query with Mining FacetsARTI R. RATHI, PROF. S. R. TODMAL |
|
1 |
30 |
Emotion Identification of Human Face from Video Using Neural NetworkMS.PRANOTI R. TAYADE, PROF. R. R. MAHARANA, PROF. A. O. AMLAKAR |
|
1 |
31 |
Survey on Data mining based prediction of User Behaviour through sessionsTUSHAR D. KOLHE, NILESH Y. CHOUDHARY |
|
1 |
32 |
A Novel Approach for Digital Image Encryption based on Pixel Explosion TechniquesSHUSAMA TRIPATHI, PROF. RISHI SHARMA |
|
1 |
33 |
A Review over Secure Communication for Vehicular Ad-Hoc NetworkNIRMAL SINGH CHOUHAN, ACHINT CHUGH |
|
1 |
34 |
A Review of Different Approaches over MIMO Handover in LTE-OFDM SystemsVIMLESH KUMAR, PROF. SHIVNARAYAN AHIRWAR |
|
1 |
35 |
Survey on File Security Using Encryption Technique over Public Cloud EnvironmentRUCHITA DATTA, PROF. SAURABH SHARMA |
|
2 |
36 |
Improvement in Visual Searching Process with Image and WordMANISHA M. KUNDLE , SHITAL JADHAV |
|
2 |
37 |
An Identification of Musical Genre: Sarangi as a Special caseMADHURI R. DESAI |
|
1 |
38 |
Modular Software Model Checking For Distributed SystemsAMIT SINGH, RUCHI SINGH, ASTHA GAUTAM |
|
2 |
39 |
Two-Factor Data Security Protection Mechanism for Cloud Storage SystemPRIYA J. KHINDRE, SHITAL Y. GAIKWAD |
|
1 |
40 |
System and a Method for Customer Service Survey Sentiment Classification and Neuro Analysis with Report MiningDEEKSHITH RAJ RATHOD |
|
2 |
41 |
reCAPTCHA and its Implementation: Human-Based Character Recognition via Web Security MeasuresNEHA VIJ |
|
2 |
42 |
Detecting Client Based HTTP Attacks on Proxy Server by XSS Attack & SQL InjectionKOMAL PATOLE |
|
2 |
43 |
A Study on Blockchains and Bitcoin - A Blockchain based CryptocurrencyRIJUL LUMAN |
|
1 |
44 |
Reduction of Peak to Average Power Ratio Using Weighted OFDMBUSHRA ZAREEN I. A. KHAN, SHIRISH L. KOTGIRE |
|
2 |
45 |
A Case Study for Image Re-sizing using Content Delivery Networks (CDN)HARSHIL KIRIT PATEL |
|
2 |
46 |
An Vision Based Monitoring System for Accurate Vojta-TherapyVAISHALIA.NIMBALKAR, PROF.V.B.RASKAR |
|
1 |
47 |
Finding the Best Key Stream by Using Genetic Algorithm for Image EncryptionPRASUN KUMAR MITRA, PARTHA HALDER |
|
1 |
48 |
Scaled Discrete Cosine Transform (DCT) using AAN Algorithm on FPGARAHUL R. BENDALE , PROF. VIJAY L. AGRAWAL |
|
1 |
49 |
Privacy Preserving on multi-keyword search with Lucene Indexer over Encrypted Data in CloudNILAM JAMDARE, PROF. K. VISHAL REDDY |
|
3 |
50 |
An Improved Task Scheduling algorithm Based on PSO for Cloud ComputingSURINDER SINGH , AMIT RANJAN |
|
1 |
51 |
Automatic Controlled Digital Notice Board by Using Wireless Direction DetectorSANJIVANI R. WADEKAR, PROF. ANIL O. AMALKAR, PROF.YOGESH P. SUSHIR |
|
3 |
52 |
Reverse Engineering Static Content and Dynamic Behaviour of E-Commerce Websites: A SurveySUDHANSHU CHOUREY , PROF .PRASHANT KUMAR KOSHTAReverse Engineering Static Content and Dynamic Behaviour of E-Commerce Websites: A SurveySUDHANSHU CHOUREY , PROF .PRASHANT KUMAR KOSHTA |
|
1 |
53 |
SVD-DWT Amalgamated Watermarking Scheme Antagonistic to Noise AttacksVIPIN KUMAR, PROF. ANSHUL BHATIA |
|
1 |
54 |
Cloud Infrastructure Resource Allocation for BigData ApplicationsPRIYANKA G, ARPITA DESHPANDE, ANUSHA RAO, ASHIK G G, KAVITHA S |
|
2 |
55 |
IoT Based Traffic Management SystemSOWMYA M, ANUSHA P S, ASHWIN S MURTHY, JOY STEFFI JONES, LYNETTE W PINTO |
|
4 |
56 |
An IOT Based Smart Home AutomationHARSHITHA B S, RAJATH ACHARYA, ISHWAR BHAT, ADITYA BHAT, MANOJ D S |
|
2 |
57 |
A Survey on Distance Estimation for Bluetooth BeaconMAYUR BHAMARE, HARSHIT PAREKH, HARSHAL SONKUSARE, MUKUL JAJU1, SWATI KESHARI |
|
2 |
58 |
An Overview of Neural Networks and their ApplicationsNUPUR THAKUR |
|
1 |
59 |
Optimizing Discrete-Event Management Systems for Arranging EventsPROF. AMOL DHAKNE, ABHISHEK BHARDWAJ, INGLE PRIYA, PRAJAKTA KHOLLAM, RUPESH PATIL |
|
3 |
60 |
Revamped Data Partitioning Strategies for Market Basket Analysis using Hadoop ClustersOMKAR HIRVE, ADITYA PARDESHI, OMKAR KURHE |
|
1 |
61 |
Defending Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender SystemsDIPIKA WATTAMWAR, GAURI NERKAR, PALLAVI SHATALWAR, YADAV PRACHI, PROF. B.S SATPUTEDefending Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender SystemsDIPIKA WATTAMWAR, GAURI NERKAR, PALLAVI SHATALWAR, YADAV PRACHI, PROF. B.S SATPUTEDefending Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender SystemsDIPIKA WATTAMWAR, GAURI NERKAR, PALLAVI SHATALWAR, YADAV PRACHI, PROF. B.S SATPUTE |
|
2 |
62 |
Blood Cell Counting and Disease detection from image using PCNNNAMRATA DHAYGUDE, KAJAL DHUMALS , VAISHALI PATOLE |
|
1 |
63 |
Storage Outsourcing with Secure Accessibility in MStorage Outsourcing with Secure Accessibility in Mobile Cloud Computing by Using LDSSPUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMAREobile Cloud Computing by Using LDSSPUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMAREStorage Outsourcing with Secure Accessibility in Mobile Cloud Computing by Using LDSSPUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMAREStorage Outsourcing with Secure Accessibility in Mobile Cloud Computing by Using LDSSPUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMARE |
|
4 |
64 |
Privacy-Preserving Location Sharing Services for Social NetworksK. SARANYA, S. SRI HARISHMA |
|
2 |
65 |
A Survey on Reduction of Movie Piracy using Automated Infrared SystemA.K.VEERARAGHAVAN, S.SHREYAS RAMACHANDRAN, V.KAVIARASAN |
|
1 |
66 |
Presence Detection and Home Automation Using Bluetooth and Android ApplicationSIDDHESH GIRASE, RAMBABU VATTI, DIVYA GURNANI |
|
2 |
67 |
A Survey: Remote Patient Health Care Monitoring and Alert Generation SystemRANI UTEKAR, JAYANT UMALE |
|
1 |
68 |
Multimodal Biometrics Fusion at Feature Level ExtractionS. P. UGALE, M. S. BORSE |
|
2 |
69 |
Comparative Study and Analysis of Manual v/s Automated Product Feature TestingNOORIN FARNAZ, ANJAN K KOUNDINYA |
|
1 |
70 |
Wireless Sensor Network: A Complete ReviewVISHAKHA BHATNAGAR, ANTIMA SAXENA, ANKUR GOYAL |
|
1 |
71 |
Data Center Architecture Based Tor Network Using Against AttackerC.MALA, T.SATHYA PRIYA |
|
3 |
72 |
Effective Routing Mechanism in Wan Based On Traffic AnalysisSANGEETHA.V, A.SARITHA |
|
2 |
73 |
Routing Control Protocol in Green Mobile Ad-Hoc Networks by Selective BroadcastingM.SASI KALA, A.SARITHA |
|
1 |
74 |
Image Enhancement Using Dual Tree Complex Wavelet Transform based Image Fusion Method -A Literature SurveyALOKRANJAN YADAV, PROF. S.P. BHOSALE |
|
1 |
75 |
GPU Accelerated Pattern Matching Algorithm for Packet Data to Detect Virus SignatureBHAGYASHRI CHHAGAN WADILE, PROF.N.R.WANKHADE |
|
1 |
76 |
Ad-Hoc Method for Social Data Collection Using FoursquareSHAMEENA V , SENTILKUMAR |
|
1 |
77 |
Feasibility of Using Machine Learning to Access Control on non-Educational LinksSHAHENSHAHA MUJAWAR, BHAUSAHEB MORE, PIRSAHB TANDEL, PROF .PRASHANT ABHONKAR |
|
1 |
78 |
Local Prediction Based Reversible WatermarkingP.S.SHENDGE, PROF.P.S.MALGE |
|
2 |
79 |
Design and Implementation of Play-out Buffer Adaptive Windowing algorithm for real-time Voice over IP Communication SystemsSUBHAJIT MUKHERJEE, SHIBDAS BHATTACHARYA, ABHISHEK DEY, PRASUN KUMAR MITRA |
|
1 |
80 |
A Survey on a Supervised Joint Topic Modeling Approach for Aspect based Sentiment Analysis and solvingCold-Start ProblemARSHIYA SHAIKH, BHAKTI PATIL, TEJASWINI DAUNDKAR, PRANJALI UTTEKAR, PROF.PRASHANT AHIRE |
|
4 |
81 |
Two-Factor Data Protection: Enhances Confidentiality of the DataSYED SAAD, SARIKA BAGADE, RAHUL SINGH, AKSHAY SIDRAL, PROF. VANDANA P. TONDE |
|
2 |
82 |
A Review on DNA Based CryptographyRUBY CHANDRAKAR, KIRTI NAHAK |
|
3 |
83 |
Hardware Co-Simulation of Sobel Edge Detection Using FPGA and System GeneratorSNEHA MOON, PROF. MEENA CHAVAN |
|
1 |
84 |
Automated Voice Based Home Navigation System for the Elderly and the Physically ChallengedROHINIKANNAKE, DR.J.S.CHITODE |
|
2 |
85 |
A Review on Various Visual Cryptography SchemesMUSKAAN KALRA, HEMANT KUMAR DUA |
|
2 |
86 |
Robust Real Time Bus Imprint SystemNIKHIL BHOYAR, PARESH BAGDE, KUNAL VAIDYA, ROSHNI RAHANGDALE, MINAL TEMBHURNE |
|
3 |
87 |
A Survey on Breast Cancer Detection Using Mammographic ImagesAMRUTA B. JADHAV, DR.S.R.GANORKAR |
|
2 |